SlideShare a Scribd company logo
1 of 13
   Name-shivani s. shah
   Class-sybba(ITM) sem=4
   Roll no.-49
   Collage-c.p. patel & f.h. shah commerce collage
provides small businesses with the ability to
deploy websites and applications quickly, to pay
          only for what you use, and leave all the
 management issues to someone else. It makes
    for a leaner business that can react faster to
                    challenges and opportunities.
RECENT ENTRIES of
cloud computing
•How Lack of Capital Can Drive Innovation
                    charity:water

•charity:water CEO Lands Huge
Commitment from Inc. 5000 CEOs
•Is War a Good Analogy for Business?
•Scott Harrison: Why Charity Be About
Guilt
•Ric Elias: How Facing Death Changed My
Life (And My Business)
Example of the of the books are including all
the think of
How to computing work….so the advertise are
also helpful
To us…..
Find Pre-Screened Suppliers
•Voip
•Web Designers
•Credit Card Processing
•Online Marketing
•Telemarketing
•Payroll Services
Only 23 percent of US and 35 percent of European cloud providers
strongly agree and agree that IT leaders of their organizations are
concerned about the security of cloud computing resources provided
                                                       Series 3
to their customers..
                                                       Series 2
          100%
           80%                                         Series 1
           60%
           40%
           20%
            0%
Access to highly qualified IT security personnel
Prevent or curtail viruses and malware infection
Secure sensitive or confidential information in
motion
Achieve compliance with leading self-regulatory
frameworks
Conduct training and awareness for all system users
Single sign-on
Data loss prevention
Correlation or event management
Access governance systems
Encryption for wireless communication
Cloud Providers & Cloud Users: A
Comparison
Looking at cloud computing from both sides
now reveals the factors that put information at
risk in the cloud. Comparing the findings from
both studies reveals that neither the company
that provides the services nor the company
that uses cloud computing seem willing to
assume responsibility for security in the cloud.
In addition, cloud computing users admit they
are not vigilant in conducting audits or
assessments of cloud computing providers
before deployment. Cloud provider is most responsible for ensuring the
security of cloud services. In sharp contrast, 69
percent of cloud providers see the cloud user as most responsible for
security, while only 35
percent of users believe they are most responsible for ensuring security.
distributon




              india
              america
              u.k
              urop
 Delivery model of IT
 Delivery of computing as a servicer
 It is deliver application via the
  internet
 Least one as more cloud system
  online
 broader concept of infratruture
  convergence
What is cloud computing

More Related Content

What's hot

What's hot (20)

Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
How large is the cyber security skills gap?
How large is the cyber security skills gap?How large is the cyber security skills gap?
How large is the cyber security skills gap?
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
 
Manage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsManage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy Steps
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 
The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
State of cybersecurity report 2020- Post Covid 19
State of cybersecurity report 2020- Post Covid 19State of cybersecurity report 2020- Post Covid 19
State of cybersecurity report 2020- Post Covid 19
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 

Viewers also liked

FUTURE MOBILITY IN TEXAS: Meeting the State’s Need for Safe and Efficient Mob...
FUTURE MOBILITY IN TEXAS: Meeting the State’s Need for Safe and Efficient Mob...FUTURE MOBILITY IN TEXAS: Meeting the State’s Need for Safe and Efficient Mob...
FUTURE MOBILITY IN TEXAS: Meeting the State’s Need for Safe and Efficient Mob...
Ports-To-Plains Blog
 
NZC - Sylvester Colorado Cleantech
NZC - Sylvester Colorado CleantechNZC - Sylvester Colorado Cleantech
NZC - Sylvester Colorado Cleantech
WRONG PERSON
 
Outlook guide 2011
Outlook guide 2011Outlook guide 2011
Outlook guide 2011
Trendtail
 
Reise knigge köln leseprobe
Reise knigge köln   leseprobeReise knigge köln   leseprobe
Reise knigge köln leseprobe
praktikant-neudenken-media
 

Viewers also liked (19)

Q&A Webinar for Analyst Relations Professionals
Q&A Webinar for Analyst Relations ProfessionalsQ&A Webinar for Analyst Relations Professionals
Q&A Webinar for Analyst Relations Professionals
 
Network Implementation and Support Lesson 13 Web Resouces
Network Implementation and Support Lesson 13   Web ResoucesNetwork Implementation and Support Lesson 13   Web Resouces
Network Implementation and Support Lesson 13 Web Resouces
 
FUTURE MOBILITY IN TEXAS: Meeting the State’s Need for Safe and Efficient Mob...
FUTURE MOBILITY IN TEXAS: Meeting the State’s Need for Safe and Efficient Mob...FUTURE MOBILITY IN TEXAS: Meeting the State’s Need for Safe and Efficient Mob...
FUTURE MOBILITY IN TEXAS: Meeting the State’s Need for Safe and Efficient Mob...
 
Piano aria regione veneto anza' salvatore giuseppe ciampolillo procedimento ...
Piano aria regione veneto  anza' salvatore giuseppe ciampolillo procedimento ...Piano aria regione veneto  anza' salvatore giuseppe ciampolillo procedimento ...
Piano aria regione veneto anza' salvatore giuseppe ciampolillo procedimento ...
 
Top copywriting tips part 2
Top copywriting tips part 2Top copywriting tips part 2
Top copywriting tips part 2
 
Intelligent Parking Brochure
Intelligent Parking BrochureIntelligent Parking Brochure
Intelligent Parking Brochure
 
Documento Qualita Aria Comune di Rimini 2009 e azioni realizzate 2001-2009
Documento Qualita Aria Comune di Rimini 2009 e azioni realizzate 2001-2009Documento Qualita Aria Comune di Rimini 2009 e azioni realizzate 2001-2009
Documento Qualita Aria Comune di Rimini 2009 e azioni realizzate 2001-2009
 
NZC - Sylvester Colorado Cleantech
NZC - Sylvester Colorado CleantechNZC - Sylvester Colorado Cleantech
NZC - Sylvester Colorado Cleantech
 
Presentazione prodotti Cyberoam
Presentazione prodotti CyberoamPresentazione prodotti Cyberoam
Presentazione prodotti Cyberoam
 
Creating Mobile Experience
Creating Mobile ExperienceCreating Mobile Experience
Creating Mobile Experience
 
Outlook guide 2011
Outlook guide 2011Outlook guide 2011
Outlook guide 2011
 
Allegato4 prc veneto con allegati
Allegato4 prc veneto con allegatiAllegato4 prc veneto con allegati
Allegato4 prc veneto con allegati
 
LA Micro Stock Report 6th January 2014
 LA Micro Stock Report 6th January 2014 LA Micro Stock Report 6th January 2014
LA Micro Stock Report 6th January 2014
 
International day power point
International day power pointInternational day power point
International day power point
 
Intelligent Authentication
Intelligent AuthenticationIntelligent Authentication
Intelligent Authentication
 
Reise knigge köln leseprobe
Reise knigge köln   leseprobeReise knigge köln   leseprobe
Reise knigge köln leseprobe
 
Start Up Cornwall 2014
Start Up Cornwall 2014Start Up Cornwall 2014
Start Up Cornwall 2014
 
Revelation Part Three
Revelation Part ThreeRevelation Part Three
Revelation Part Three
 
Ora 4 the_sqldba
Ora 4 the_sqldbaOra 4 the_sqldba
Ora 4 the_sqldba
 

Similar to What is cloud computing

Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
Ness Technologies
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 

Similar to What is cloud computing (20)

CyberArk Stock Pitch
CyberArk Stock PitchCyberArk Stock Pitch
CyberArk Stock Pitch
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
 
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
CyberDen 2020
CyberDen 2020CyberDen 2020
CyberDen 2020
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 

More from Hardik Kakadiya (20)

Break even point(BEP)
Break even point(BEP)Break even point(BEP)
Break even point(BEP)
 
Nano the people’s car
Nano the people’s carNano the people’s car
Nano the people’s car
 
Apple computer l
Apple computer lApple computer l
Apple computer l
 
Apple 11.00 section
Apple 11.00 sectionApple 11.00 section
Apple 11.00 section
 
Vaio
VaioVaio
Vaio
 
Sandip.(mba)
Sandip.(mba)Sandip.(mba)
Sandip.(mba)
 
Evolution of com
Evolution of comEvolution of com
Evolution of com
 
E business or e-buss..
E business or e-buss..E business or e-buss..
E business or e-buss..
 
E commerce
E commerceE commerce
E commerce
 
Dddd
DdddDddd
Dddd
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Communal riots
Communal riotsCommunal riots
Communal riots
 
Childlabour
ChildlabourChildlabour
Childlabour
 
Change in apple i phone generations
Change in apple i phone generationsChange in apple i phone generations
Change in apple i phone generations
 
05 global mobile satellite
05 global mobile satellite05 global mobile satellite
05 global mobile satellite
 
Business management
Business managementBusiness management
Business management
 
Business organization
Business organizationBusiness organization
Business organization
 
Business communication
Business communicationBusiness communication
Business communication
 
Satellite phone it
Satellite phone itSatellite phone it
Satellite phone it
 
Seminar
SeminarSeminar
Seminar
 

What is cloud computing

  • 1. Name-shivani s. shah  Class-sybba(ITM) sem=4  Roll no.-49  Collage-c.p. patel & f.h. shah commerce collage
  • 2.
  • 3. provides small businesses with the ability to deploy websites and applications quickly, to pay only for what you use, and leave all the management issues to someone else. It makes for a leaner business that can react faster to challenges and opportunities.
  • 4. RECENT ENTRIES of cloud computing •How Lack of Capital Can Drive Innovation charity:water •charity:water CEO Lands Huge Commitment from Inc. 5000 CEOs •Is War a Good Analogy for Business? •Scott Harrison: Why Charity Be About Guilt •Ric Elias: How Facing Death Changed My Life (And My Business)
  • 5. Example of the of the books are including all the think of How to computing work….so the advertise are also helpful To us…..
  • 6. Find Pre-Screened Suppliers •Voip •Web Designers •Credit Card Processing •Online Marketing •Telemarketing •Payroll Services
  • 7. Only 23 percent of US and 35 percent of European cloud providers strongly agree and agree that IT leaders of their organizations are concerned about the security of cloud computing resources provided Series 3 to their customers.. Series 2 100% 80% Series 1 60% 40% 20% 0%
  • 8. Access to highly qualified IT security personnel Prevent or curtail viruses and malware infection Secure sensitive or confidential information in motion Achieve compliance with leading self-regulatory frameworks Conduct training and awareness for all system users
  • 9. Single sign-on Data loss prevention Correlation or event management Access governance systems Encryption for wireless communication
  • 10. Cloud Providers & Cloud Users: A Comparison Looking at cloud computing from both sides now reveals the factors that put information at risk in the cloud. Comparing the findings from both studies reveals that neither the company that provides the services nor the company that uses cloud computing seem willing to assume responsibility for security in the cloud. In addition, cloud computing users admit they are not vigilant in conducting audits or assessments of cloud computing providers before deployment. Cloud provider is most responsible for ensuring the security of cloud services. In sharp contrast, 69 percent of cloud providers see the cloud user as most responsible for security, while only 35 percent of users believe they are most responsible for ensuring security.
  • 11. distributon india america u.k urop
  • 12.  Delivery model of IT  Delivery of computing as a servicer  It is deliver application via the internet  Least one as more cloud system online  broader concept of infratruture convergence